News
-
"CyLab Icon Connects Users With Online Privacy Choices"Researchers from the CyLab Security and Privacy Institute at Carnegie Mellon University (CMU), the University of Michigan, and Fordham University have made it easy for users to choose how websites use their personal information, all in a single spot. The…
-
"Q&A With Danish Saleem: A 'Bottomless Cyber Enthusiast' Works To Secure US Power Grid Against Hackers"Danish Saleem is a senior energy systems cybersecurity researcher at the National Renewable Energy Laboratory (NREL) who has focused on distributed energy systems, such as rooftop solar panels, that typically serve local customers. These systems…
-
"Education Sector Sees 34% Increase in IoT Attacks"According to Check Point Research, the education and research sector has experienced a significant increase in attacks against Internet of Things (IoT) devices, with 131 weekly attacks per organization, more than double the global average and a…
-
"Browsing Threats Top List of CISO Concerns"When asked about the most serious cyber threats facing their organizations, 43 percent of CISOs placed browsing threats at the top of their list. A new RedAccess report, based on responses from 300 CISOs in the UK and the UK, highlights the impact of…
-
"A Practical Framework to Prepare for the Post-Quantum Future"The world is becoming aware of the threat posed by adversaries equipped with quantum computers. Andersen Cheng, CEO of Post-Quantum, a cybersecurity company specializing in quantum-safe security and identity solutions, believes the OODA framework,…
-
"Adobe Plugs Gaping Security Holes in Reader, Acrobat"Software maker Adobe recently shipped patches for at least 56 security vulnerabilities in a wide range of products, some severe enough to expose Windows and macOS users to code execution attacks. Adobe called special attention to its APSB23-24…
-
"CISA Releases Updated Zero Trust Maturity Model"The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has published the second version of the Zero Trust Maturity Model. This version incorporates recommendations from a public comment period and advances the…
-
"ChatGPT and Google Bard Abused to Steal Passwords"Cybercriminals are exploiting the popularity of ChatGPT and Google Bard to spread RedLine Stealer malware and steal sensitive user data. According to Veriti security researchers, one of the most significant concerns associated with generative Artificial…
-
"Eliminating 2% of Exposures Could Protect 90% of Critical Assets"According to researchers at XM Cyber, only 2% of all exposures enable attackers with seamless access to critical assets, while 75% of exposures along attack paths lead to “dead ends.” The researchers analyzed over 60 million exposures in over 10…
-
"Microsoft Exchange Server 2013 Reaches End of Support"Microsoft Exchange Server 2013 has reached end of support on April 11, 2023, and will no longer receive security patches. The product will continue to work even after this date, but Microsoft stated that it is no longer providing technical support…
-
"Latitude Financial Refuses to Pay Ransom"A leading Australian lender has refused to pay online extorters demanding a ransom for the personal data they stole on an estimated 14 million customers. Latitude Financial CEO, Bob Belan, stated that paying the threat actors would bring no…
-
"Azure Admins Warned to Disable Shared Key Access as Backdoor Attack Detailed"According to Orca Security researchers, a design flaw in Microsoft Azure could allow attackers to gain full access to a user's environment. This design flaw is that shared key authorization is enabled by default when creating storage accounts. Attackers…